Code:
/ FXUpdate3074 / FXUpdate3074 / 1.1 / untmp / whidbey / QFE / ndp / fx / src / xsp / System / Web / Security / UrlAuthorizationModule.cs / 4 / UrlAuthorizationModule.cs
//------------------------------------------------------------------------------
//
// Copyright (c) Microsoft Corporation. All rights reserved.
//
//-----------------------------------------------------------------------------
/*
* UrlAuthorizationModule class
*
* Copyright (c) 1999 Microsoft Corporation
*/
namespace System.Web.Security {
using System.Runtime.Serialization;
using System.Web;
using System.Web.Util;
using System.Collections;
using System.Web.Configuration;
using System.IO;
using System.Security.Principal;
using System.Security.Permissions;
using System.Web.Management;
using System.Web.Hosting;
using System.Collections.Generic;
///
/// This module provides URL based
/// authorization services for allowing or denying access to specified resources
///
[AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)]
public sealed class UrlAuthorizationModule : IHttpModule {
///
///
/// Initializes a new instance of the
/// class.
///
///
[SecurityPermission(SecurityAction.Demand, Unrestricted=true)]
public UrlAuthorizationModule() {
}
///
/// [To be supplied.]
///
public void Init(HttpApplication app) {
app.AuthorizeRequest += new EventHandler(this.OnEnter);
}
///
/// [To be supplied.]
///
public void Dispose() {
}
private static bool s_EnabledDetermined;
private static bool s_Enabled;
[SecurityPermission(SecurityAction.Demand, Unrestricted=true)]
public static bool CheckUrlAccessForPrincipal(String virtualPath, IPrincipal user, string verb) {
if (virtualPath == null)
throw new ArgumentNullException("virtualPath");
if (user == null)
throw new ArgumentNullException("user");
if (verb == null)
throw new ArgumentNullException("verb");
verb = verb.Trim();
VirtualPath vPath = VirtualPath.Create(virtualPath);
if (!vPath.IsWithinAppRoot)
throw new ArgumentException(SR.GetString(SR.Virtual_path_outside_application_not_supported), "virtualPath");
if (!s_EnabledDetermined) {
if( !HttpRuntime.UseIntegratedPipeline) {
HttpModulesSection modulesSection = RuntimeConfig.GetConfig().HttpModules;
int len = modulesSection.Modules.Count;
for (int iter = 0; iter < len; iter++) {
HttpModuleAction module = modulesSection.Modules[iter];
if (Type.GetType(module.Type, false) == typeof(UrlAuthorizationModule)) {
s_Enabled = true;
break;
}
}
}
else {
List modules = HttpApplication.IntegratedModuleList;
foreach (ModuleConfigurationInfo mod in modules) {
if (Type.GetType(mod.Type, false) == typeof(UrlAuthorizationModule)) {
s_Enabled = true;
break;
}
}
}
s_EnabledDetermined = true;
}
if (!s_Enabled)
return true;
AuthorizationSection settings = RuntimeConfig.GetConfig(vPath).Authorization;
// Check if the user is allowed, or the request is for the login page
return settings.EveryoneAllowed || settings.IsUserAllowed(user, verb);
}
////////////////////////////////////////////////////////////
////////////////////////////////////////////////////////////
////////////////////////////////////////////////////////////
// Module Enter: Get the authorization configuration section
// and see if this user is allowed or not
void OnEnter(Object source, EventArgs eventArgs) {
HttpApplication app;
HttpContext context;
app = (HttpApplication)source;
context = app.Context;
if (context.SkipAuthorization)
{
if (context.User == null || !context.User.Identity.IsAuthenticated)
PerfCounters.IncrementCounter(AppPerfCounter.ANONYMOUS_REQUESTS);
return;
}
// Get the authorization config object
AuthorizationSection settings = RuntimeConfig.GetConfig(context).Authorization;
// Check if the user is allowed, or the request is for the login page
if (!settings.EveryoneAllowed && !settings.IsUserAllowed(context.User, context.Request.RequestType))
{
// Deny access
context.Response.StatusCode = 401;
WriteErrorMessage(context);
if (context.User != null && context.User.Identity.IsAuthenticated) {
// We don't raise failure audit event for anonymous user
WebBaseEvent.RaiseSystemEvent(this, WebEventCodes.AuditUrlAuthorizationFailure);
}
app.CompleteRequest();
}
else
{
if (context.User == null || !context.User.Identity.IsAuthenticated)
PerfCounters.IncrementCounter(AppPerfCounter.ANONYMOUS_REQUESTS);
WebBaseEvent.RaiseSystemEvent(this, WebEventCodes.AuditUrlAuthorizationSuccess);
}
}
/////////////////////////////////////////////////////////////////////////////
void WriteErrorMessage(HttpContext context) {
context.Response.Write(UrlAuthFailedErrorFormatter.GetErrorText());
// In Integrated pipeline, ask for handler headers to be generated. This would be unnecessary
// if we just threw an access denied exception, and used the standard error mechanism
context.Response.GenerateResponseHeadersForHandler();
}
static internal bool RequestRequiresAuthorization(HttpContext context) {
if (context.SkipAuthorization)
return false;
AuthorizationSection settings = RuntimeConfig.GetConfig(context).Authorization;
// Check if the anonymous user is allowed
if (_AnonUser == null)
_AnonUser = new GenericPrincipal(new GenericIdentity(String.Empty, String.Empty), new String[0]);
return !settings.IsUserAllowed(_AnonUser, context.Request.RequestType);
}
internal static bool IsUserAllowedToPath(HttpContext context, VirtualPath virtualPath)
{
AuthorizationSection settings = RuntimeConfig.GetConfig(context, virtualPath).Authorization;
return settings.EveryoneAllowed || settings.IsUserAllowed(context.User, context.Request.RequestType);
}
static GenericPrincipal _AnonUser;
}
}
// File provided for Reference Use Only by Microsoft Corporation (c) 2007.
// Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- SmtpLoginAuthenticationModule.cs
- OracleNumber.cs
- BindToObject.cs
- TableCellCollection.cs
- SmtpDigestAuthenticationModule.cs
- CharConverter.cs
- GridEntry.cs
- ProvideValueServiceProvider.cs
- CodeRegionDirective.cs
- RelatedEnd.cs
- BrushValueSerializer.cs
- FloatAverageAggregationOperator.cs
- SmiMetaDataProperty.cs
- TraceListener.cs
- unsafenativemethodsother.cs
- StringSource.cs
- TextSpanModifier.cs
- TextHidden.cs
- TableSectionStyle.cs
- TransactedBatchingBehavior.cs
- SplitterEvent.cs
- ResourcesBuildProvider.cs
- WebBrowserNavigatingEventHandler.cs
- GeneralTransform2DTo3DTo2D.cs
- CodeCastExpression.cs
- InfoCardRSACryptoProvider.cs
- Light.cs
- ObjectToken.cs
- DocComment.cs
- UIElement3D.cs
- WeakReferenceKey.cs
- MD5.cs
- AggregatePushdown.cs
- BitmapEffectvisualstate.cs
- PageAsyncTask.cs
- TextUtf8RawTextWriter.cs
- SqlComparer.cs
- ToolStripDropDownClosedEventArgs.cs
- RijndaelManaged.cs
- parserscommon.cs
- WorkflowFileItem.cs
- VSWCFServiceContractGenerator.cs
- WeakReferenceList.cs
- DocumentScope.cs
- TCEAdapterGenerator.cs
- InputLanguageCollection.cs
- SqlInternalConnectionSmi.cs
- XmlNode.cs
- FormViewUpdatedEventArgs.cs
- ResourceReader.cs
- Module.cs
- OleDbStruct.cs
- SecurityContext.cs
- ChineseLunisolarCalendar.cs
- activationcontext.cs
- Vector3DAnimationBase.cs
- ActivityTypeCodeDomSerializer.cs
- SrgsOneOf.cs
- CredentialCache.cs
- CodeExpressionStatement.cs
- ObjectList.cs
- PathFigureCollectionValueSerializer.cs
- PieceDirectory.cs
- SoapAttributeOverrides.cs
- EventEntry.cs
- LinqDataSourceSelectEventArgs.cs
- QilGenerator.cs
- BoundColumn.cs
- CodeRegionDirective.cs
- ConfigurationPermission.cs
- ActivationArguments.cs
- Invariant.cs
- IdentityHolder.cs
- DbgUtil.cs
- TableLayoutSettingsTypeConverter.cs
- Funcletizer.cs
- WebBrowser.cs
- PageTheme.cs
- DiagnosticTrace.cs
- RC2.cs
- ECDiffieHellman.cs
- GenericTextProperties.cs
- TextHidden.cs
- NamespaceListProperty.cs
- WebBrowserContainer.cs
- CodeGroup.cs
- ProxyWebPartManagerDesigner.cs
- DefaultBindingPropertyAttribute.cs
- DataPagerFieldCollection.cs
- COM2ExtendedBrowsingHandler.cs
- MenuItemStyle.cs
- MailDefinitionBodyFileNameEditor.cs
- unsafenativemethodsother.cs
- Html32TextWriter.cs
- UTF32Encoding.cs
- TemplateInstanceAttribute.cs
- TreeNode.cs
- Debug.cs
- DeviceFilterDictionary.cs
- LineProperties.cs